Browse > Article
http://dx.doi.org/10.13089/JKIISC.2009.19.6.145

A Study on the Secure Plan of Security in SCADA Systems  

Kim, Young-Jin (Graduate School of Infomation Management and Security CIST, Korea University)
Lee, Jung-Hyun (Graduate School of Infomation Management and Security CIST, Korea University)
Lim, Jong-In (Graduate School of Infomation Management and Security CIST, Korea University)
Abstract
SCADA(Supervisory Control And Data Acquisition) systems are widely used for control and monitoring of critical infrastructures including electricity, gas and transportation. Any compromise in the security of SCADA systems could result in massive chaos and disaster at a national level if a malicious attacker takes the control of the system. Therefore, sound countermeasures must be provided when the SCADA systems are being developed as well as when they are being operated. Unlike general information processing system, SCADA systems have different service responses, communication protocols and network architectures and therefore a different approach should be applied to each SCADA systems that takes into consideration of each system's security characteristics and architectures. In addition, legal basis should be established to ensure the nationwide management of the systems security. This paper examines the vulnerabilites of SCADA systems and proposes action plans to protect the systems against cyber attacks.
Keywords
SCADA; security characteristics;
Citations & Related Records
Times Cited By KSCI : 1  (Citation Analysis)
연도 인용수 순위
1 민병길, 김신규, 장문수, 서정택, "SCADA 시스템의 안전한 망 연동," 한국사이버테러정보전학회 정보.보안논문지, 9(1), pp. 95-103, 2009년 3월
2 International Electrotechnical Commission, "Data and Communication Security–%Profiles Including TCP/IP," IEC 62351-3, IEC Standard, pp. 6-9, Jan. 2007
3 International Electrotechnical Commission, "Data and Communication Security –Profiles Including MMS," IEC 62351-4, IEC Standard, pp. 6-15, Jan. 2007
4 U.S. Department of Energy, U.S. Department of Homeland Security, "Roadmap to Secure Control Systems in the Energy Sector," pp. 16-17, Jan. 2006
5 U.S. Water Sector Coordinating Council Cyber Security Working Group, "Roadmap to Secure Control Systems in the Water Sector," pp. 21-33, Mar. 2008
6 J.N. Froscher, D.M. Goldschlag, M.H. Kang, C.E. Landwehr, A.P. Moore, I.S. Moskowitz, and C.N. Payne, "Improving Inter-Enclave Information Flow for a Secure Strike Planning Application," Proc. of 11th Computer Security Applications Conference, pp. 89-98, Dec. 1995
7 N. Stevens and M. Pope, "An Implementation of an Optical Data Diode," DSTO-TR-0785, DSTO Technical Report, May 1999
8 국가정보원, 방송통신위원회, "2008 국가정보보호 백서," pp. 99-103, 2008년 4월
9 김인중, 정윤정, 고재영, 원동호, "중요핵심기반시설(SCADA)에 대한 보안 관리 연구," 한국통신학회논문지, 30(8C), pp. 838-848, 2005년 8월
10 J. Lee, H. Lee, and S. Kim, "Development Plan of Korean - Energy Management System," Proc. of the 17th Conference of the Electric Power Supply Industry, pp. 1-3, Oct. 2008
11 정보통신기반보호법, 법률 제8852호, 2008년 2월
12 이철수, "원방감시제어자료수집(SCADA) 시스템 보안성 강화 방안," 국가사이버안전센터, Monthly 사이버 시큐리티, pp. 8-17, 2005년 12월
13 International Electrotechnical Commission, "Data and Communication Security -Security for IEC 61850," IEC 62351-6, IEC Standard, pp. 6-12, Jan. 2007
14 K. Stouffer, J. Falco, and K. Kent, "Guide to Supervisory Control and Data Acquisition (SCADA) and Industrial Control Systems Security," NIST Special Publication 800-82, pp. 1-13, Sep. 2006
15 김명수, 임용훈, 현덕화, 김충환, "전력자동화용 통신프로토콜 현황 및 분석," 대한전기학회 하계학술대회논문집, pp. 2349-2351, 2003년 7월